Ben Campbell has entered the following ballot position for
draft-ietf-i2nsf-problem-and-use-cases-12: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-i2nsf-problem-and-use-cases/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I agree with the various abstains about this draft not appearing to have
archival value. I chose not to ballot "abstain" because I think it's best
to handle that issue at charter or adoption time rather than doing so
this close to the finish line. (I note that the WG charter explicitly
says that the WG may choose not to publish, so this is a borderline
case.) If there really are good reasons to expect archival value, it
would be helpful to include a paragraph early in the document describing
those reasons.

I also agree that this should be informational.

I have a few additional comments on the odd chance this draft
progresses:

-2:
--  B2B describes a business model. I don't see how that is useful for
IETF discussion unless it implies specific technical characteristics. If
it does, them please describe them.
Bespoke": In other usages, "bespoke" often implies positive thing, which
I don't think the draft intends. I think the work "customized" would
better fit the usage herein.

-3: "The "Customer-Provider" relationship may be between any two parties.
The parties can be in different firms or different domains of the same
firm."
There again seem to be implied business models here. Is it technically
relevant if organizations qualify as "firms"?

- 3.1.1:
-- Consider adding DMZ to the glossary
-- "Centralized or Distributed security functions" seems out of place.
The rest of the section describes kinds of security functions; this
describes the design of security functions.

- 3.2.1, first sentence: The second instance of "deploy" seems like a
strange usage. Should this be "use"?

-3.5, title: s/Difficulty/Difficult

-3.6: "SDN-inferred agility"
Should that be SDN "implied" or "conferred" agility?

- 4.2: 
-- "typically by means of Business- to-Business (B2B) communications."
Again, does B2B imply some technical characteristics of the
communication? Otherwise, how is this different than just
"communication"?
-- Figure 3: Please define or cite a definition for Evolved Packet
Core.

-7: Are there no privacy related requirements?


_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to